Skip to content

Commit 9603600

Browse files
authored
Merge pull request #220464 from mbender-ms/lb-fresh-troubleshoot
Load Balancer - Freshness - load-balancer-troubleshoot.md
2 parents 1b240b3 + 1dd8d63 commit 9603600

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

articles/load-balancer/load-balancer-troubleshoot.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: Learn how to troubleshoot common issues with Azure Load Balancer.
44
services: load-balancer
55
documentationcenter: na
66
author: mbender-ms
7-
manager: dcscontentpm
8-
ms.custom: seodoc18
7+
manager: kumudD
98
ms.service: load-balancer
109
ms.topic: troubleshooting
1110
ms.tgt_pltfrm: na
1211
ms.workload: infrastructure-services
13-
ms.date: 01/28/2020
12+
ms.date: 12/05/2022
1413
ms.author: mbender
14+
ms.custom: FY23 content-maintenance
1515
---
1616

1717
# Troubleshoot Azure Load Balancer
@@ -23,42 +23,42 @@ When the Load Balancer connectivity is unavailable, the most common symptoms are
2323
- VMs behind the Load Balancer aren't responding to health probes
2424
- VMs behind the Load Balancer aren't responding to the traffic on the configured port
2525

26-
When the external clients to the backend VMs go through the load balancer, the IP address of the clients will be used for the communication. Make sure the IP address of the clients are added into the NSG allow list.
26+
When the external clients to the backend VMs go through the load balancer, the IP address of the clients will be used for the communication. Make sure the IP address of the clients are added into the NSG allowlist.
2727

2828
## No outbound connectivity from Standard internal Load Balancers (ILB)
2929

3030
**Validation and resolution**
3131

32-
Standard ILBs are **secure by default**. Basic ILBs allowed connecting to the internet via a *hidden* Public IP address called the default outbound access IP. This isn't recommended for production workloads as the IP address is neither static nor locked down via NSGs that you own. If you recently moved from a Basic ILB to a Standard ILB, you should create a Public IP explicitly via [Outbound only](egress-only.md) configuration, which locks down the IP via NSGs. You can also use a [NAT Gateway](../virtual-network/nat-gateway/nat-overview.md) on your subnet. NAT Gateway is the recommended solution for outbound.
32+
Standard ILBs are **secure by default**. Basic ILBs allowed connecting to the internet via a *hidden* Public IP address called the default outbound access IP. This isn't recommended for production workloads as the IP address isn't static or locked down via network security groups that you own. If you recently moved from a Basic ILB to a Standard ILB, you should create a Public IP explicitly via [Outbound only](egress-only.md) configuration, which locks down the IP via network security groups. You can also use a [NAT Gateway](../virtual-network/nat-gateway/nat-overview.md) on your subnet. NAT Gateway is the recommended solution for outbound.
3333

34-
## Can't change backend port for existing LB rule of a load balancer that has virtual machine scale set deployed in the backend pool.
34+
## Can't change backend port for existing LB rule of a load balancer that has Virtual Machine Scale Set deployed in the backend pool.
3535

36-
### Cause: The backend port cannot be modified for a load balancing rule that's used by a health probe for load balancer referenced by virtual machine scale set
36+
### Cause: The backend port can't be modified for a load balancing rule that's used by a health probe for load balancer referenced by Virtual Machine Scale Set
3737

3838
**Resolution**
39-
In order to change the port, you can remove the health probe by updating the virtual machine scale set, update the port and then configure the health probe again.
39+
In order to change the port, you can remove the health probe by updating the Virtual Machine Scale Set, update the port and then configure the health probe again.
4040

4141
## Small traffic is still going through load balancer after removing VMs from backend pool of the load balancer.
4242

4343
### Cause: VMs removed from backend pool should no longer receive traffic. The small amount of network traffic could be related to storage, DNS, and other functions within Azure.
4444

45-
To verify, you can conduct a network trace. The FQDN used for your blob storage accounts are listed within the properties of each storage account. From a virtual machine within your Azure subscription, you can perform nslookup to determine the Azure IP assigned to that storage account.
45+
To verify, you can conduct a network trace. The Fully Qualified Domain Name (FQDN) used for your blob storage account is listed within the properties of each storage account. From a virtual machine within your Azure subscription, you can perform `nslookup` to determine the Azure IP assigned to that storage account.
4646

4747
## Additional network captures
4848

4949
If you decide to open a support case, collect the following information for a quicker resolution. Choose a single backend VM to perform the following tests:
5050

51-
- Use ps ping from one of the backend VMs within the VNet to test the probe port response (example: ps ping 10.0.0.4:3389) and record results.
51+
- Use `ps ping` from one of the backend VMs within the VNet to test the probe port response (example: ps ping 10.0.0.4:3389) and record results.
5252
- If no response is received in these ping tests, run a simultaneous Netsh trace on the backend VM and the VNet test VM while you run PsPing then stop the Netsh trace.
5353

5454
## Load Balancer in failed state
5555

5656
**Resolution**
5757

5858
- Once you identify the resource that is in a failed state, go to [Azure Resource Explorer](https://resources.azure.com/) and identify the resource in this state.
59-
- Update the toggle on the right-hand top corner to Read/Write.
60-
- Click on Edit for the resource in failed state.
61-
- Click on PUT followed by GET to ensure the provisioning state was updated to Succeeded.
59+
- Update the toggle on the right-hand top corner to **Read/Write**.
60+
- Select **Edit** for the resource in failed state.
61+
- Select **PUT** followed by **GET** to ensure the provisioning state was updated to Succeeded.
6262
- You can then proceed with other actions as the resource is out of failed state.
6363

6464
## Next steps

0 commit comments

Comments
 (0)